Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca.

Slides:



Advertisements
Similar presentations
A Local Mean Field Analysis of Security Investments in Networks Marc Lelarge (INRIA-ENS) Jean Bolot (SPRINT) NetEcon 2008.
Advertisements

Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011.
Risk Models and Controlled Mitigation of IT Security R. Ann Miura-Ko Stanford University February 27, 2009.
IPv6 Deployment CANTO Nate Davis, Chief Operating Officer 13 August 2014.
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
Software Piracy. The Impact of Software Piracy By: Andy Ajello.
7 Effective Habits when using the Internet Philip O’Kane 1.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter 6 Entrepreneurship and Business Planning.
Software Diversity for Information Security Gaurav Kataria Carnegie Mellon University.
Software Asset Management The New Competitive Advantage.
DO AMERICANS CONSUME TOO LITTLE NATURAL GAS?An Empirical Test of Marginal Cost Pricing. By Lucas W. Davis and Erich Muehlegger. Key words :Efficient pricing,
The Gov't Should Filter P2P Music Movies Software.
Adware, Shareware, and Consumer Privacy by Nataly Gantman, Tel Aviv University Yossi Spiegel, Tel Aviv University NET institute conference April 1, 2005.
1 IS371 WEEK 8 Last and Final Assignment Application Development Alternatives to Application Development Instructor Online Evaluations.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Cloud Implications on Software Network Structure and Security Risks Terrence August Rady School of Management, UC San Diego Joint with Marius Florin Niculescu.
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
Do Americans Consume too little Natural Gas? An empirical test of marginal cost pricing By : Lucas W. Davis & Erich Muehlegger Presented by: Fadhila.
Copyright ©2004 Pearson Education, Inc. All rights reserved. Chapter 18 Asset Allocation.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Get More from Your Software The Genuine Windows Vista™ Experience.
13-1 Information Technology Economics Information Technology: Economic and Financial Trends Internal IT versus outsourcing Expanding power / declining.
Problem Identification – Part 1 Lecture 3 2 Recall… Recognition of Need Becoming Informed Problem Definition Concept Generation Concept Selection Embodiment.
Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments Terrence August Rady School of Management,
The Strategy of International Business
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Economics Vocabulary.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Introduction to Computer Ethics
Intellectual Property Rights Software in Poland Tomasz Bochenek Dyrektor Generalny Microsoft Sp.z o.o.
Information Assurance Research Group 1 NSA Security-Enhanced Linux (SELinux) Grant M. Wagner Information Assurance.
Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments Terrence August Rady School of Management,
Ilkka Kiema Future Internet and Economics (FIEN) Workshop May 6, 2009 Some Economic Aspects of Future Internet.
Topic 4 Marketing International Marketing and E-Commerce.
+ The Free Enterprise System Chapter #5. + Chapter Objectives Explain the characteristics of a free enterprise system Distinguish between price and non-price.
Marketing Research.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
MIS An Economic Analysis of Software Market with Risk-Sharing Contract Byung Cho Kim Pei-Yu Chen Tridas Mukhopadhyay Tepper School of Business Carnegie.
Windows Operating system
David Cheung, CECID/HKU 1 Open Source Software and It’s Impact to Technology Development Dr. David Wai-lok Cheung ( 張偉犖博士 ) Director Center for E-Commerce.
Monopoly CHAPTER 12. After studying this chapter you will be able to Explain how monopoly arises and distinguish between single-price monopoly and price-discriminating.
Irwin/McGraw-Hill © The McGraw-Hill Companies, Inc., 1998 Gilbert A. Churchill, Jr. J. Paul Peter Chapter 20 Implementing and Controlling Marketing Activities.
Unit 5 Operations Management Location. Learning Objectives To be able to explain the causes and consequences of location and relocation – domestically.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
 Traditional economy :  Economic decisions are based on custom and historical precedent.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Intermediation, Compensation and Tacit Collusion in Insurance Markets Andreas Richter Ludwig-Maximilians-University Muinch Jörg Schiller WHU – Otto Beisheim.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
February 9, 2008 GLOPE-TCER Joint Junior Workshop 1 Interregional Mixed Duopoly, Location and Welfare Tomohiro Inoue*, Yoshio Kamijo and Yoshihiro Tomaru.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Welcome to CSI-4118!. Happy Birthday, Internet! 35 years and 7 days ago, ARPANET, the Military's progenitor to the Internet, was first powered on ARPANET.
Economics of Network Security Initial presentation Knut Magnus Kvamtrø NTNU
L EARNING BY C OPYING Francisco Martínez-Sánchez Universidad de Granada.
Cases Study: Code Red. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G. Hogle. Case Study: Code Red Author: Jedidiah.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
1 What will be the Coming Super Worms and Viruses By Alan S H Lam.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Summary of Learning Objectives
Distributed Asset Management Making The Business Case
THE STRATEGY OF INTERNATIONAL BUSINESS
Communication Planning
Case Study: Code Red Author: Jedidiah R. Crandall,
Celian Colon (Ecole Polytechnique, Ecole Normale supérieure, Paris)
Security in the Real World – Plenary Day One
Presentation transcript:

Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Motivation Internet Server Software Market

Motivation Code Red and the Problem  Code Red / Code Red II  Worm that attacks web servers running IIS  Installs back door and propagates 100 times over per infection  Distributed Denial of Service (DDoS) attack on www1.whitehouse.gov  Patch issued by Microsoft on June 18, 2001  Code Red worm strikes on July 19, 2001  $2.75 Billion in damages

WormDate Vulnerability Notice Estimated Cost ($) Code Red month2.75 Billion Slammer months1.5 Billion Blaster month750 Million Sasser weeks14.8 Billion Zotob days$98K/company (on average) Motivation

US-CERT Coordination Center

Motivation Microsoft (Windows Genuine Advantage) Apr-04 May-04 Late May-04 Jul-04Sept-04 Feb-05 May-05 Mike Nash (VP, Security Business and Technology Unit) and Barry Goffe (Product Mgr) on record: pirates can obtain security patches Microsoft issues statement saying that only paid customers will have access to Service Pack 2 for XP Microsoft loosens restrictions, only checking for two counterfeit keys for SP2 update Trial stage Windows Genuine Advantage followed by pilot phase for 20 countries. Microsoft claims that for WGA, security patches will be exempt. Permit Pirates SP2 Restrict Pirates SP2 Permit Pirates SP2 Restrict Pirates WGA Permit Pirates WGA

Motivation

Two Options  Make security patches available to all users  Network is more secure  Sasser worm: $14.8B  Slammer worm: $1.5B  Network effects  Restrict security patches only to legitimate users  Network is less secure  Curb piracy

Motivation Piracy in the Software Industry  Business Software Alliance (BSA) and International Data Corporation (IDC)  Piracy rates  35% in 2004  Exceeds 75% in 24 countries  Economic Losses (globally)  $59B spent on packaged software  $90B+ installed

Motivation Research Questions  Under high network security risk, should a software vendor make security patches readily available to all users?  Why might a vendor such as Microsoft allow pirates to patch security vulnerabilities?  Can piracy lead to less secure software products?  Are the arguments made by the security community that software vendors should “do the right thing” valid?

Literature Review Economics of Info. Security and Piracy Information Security Interdependent Security e.g., Kunreuther et al. (2002), Kunreuther and Heal (2003, 2005), Varian (2004), August and Tunca (2006) Quantification of Losses e.g., Moore and Shannon (2002), Cavusoglu (2004) Worm Spread Dynamics e.g., Weaver et al (2003) Piracy e.g., Peitz and Waelbroeck (2003)

Model Key Observations  Software patching is costly  Losses from security breaches are positively correlated with valuations  Piracy tendencies vary across users

Model Timeline t = 0t = 1t = 3t = 2 Vendor sets price and policy Consumers make usage decisions Vendor releases security patches / Consumers make patching decisions Worm attack realizes on network

Model Consumer Model  Consumer valuation space:  Consumer heterogeneity in regard to piracy:  Consumer action space:

 Effective cost of patching:  Loss from attack:  Expected cost of piracy: Model Costs and Losses

Consumer Market Structure Consumer’s Problem   

Consumer Market Structure Equilibrium Characteristics  There is always a group of consumers who use but do not patch  There is always a population of users whose valuations are higher than the price but end up not purchasing the software  Users impose negative externalities on:  Other users  The software vendor

 Pricing to deter piracy:  Two regions – August and Tunca (2006) Consumer Market Structure Pricing and Piracy Region 2: High price Region 1: Low price

Consumer Market Structure Threshold Characterization

Consumer Market Structure Pricing and Piracy  Two policies which the firm can enforce:  Permissive policy:  “Let” the pirates patch  Restrictive policy:  Do “not let” the pirates patch

Consumer Market Structure Let the Pirates Patch:  Unpatched population:

Consumer Market Structure Let the Pirates Patch:  Four possible equilibrium market structures Increasing security risk

Consumer Market Structure Don’t Let the Pirates Patch:  Unpatched population:

Consumer Market Structure Don’t Let the Pirates Patch:  Six possible equilibrium market structures Increasing security risk

Vendor Profit Maximization Profit Functions and the Vendor’s Problem:

 When to restrict security patches?  When to let pirates patch? Results Optimal Policy Decision for the Vendor

Results Proposition 1: When to be restrictive  When the effective security risk is high, a software vendor can strictly increase his profit by restricting pirates from receiving security patches.  Common perception  Reduce the risk on the network  A more secure product benefits all users

Results Don’t let them patch when… LetDo not Let

Results Proposition 2: When to be permissive  When the patching cost is not too high and the effective security risk is below a threshold value, a software vendor should permit pirates with access to security patches.  Contrast  Strong incentives to patch  Vendor wants to price high  Not willing to provide incentives for conversion  Increased usage due to reduction in negative network effects

Results Let them patch when… Let Do not Let

Results Proposition 3  When the potential for piracy in a market is high, a software vendor should enforce a restrictive policy.  Candidates: Vietnam, Ukraine, China, …  Small size of low piracy tendency (Type L) population  When the potential for piracy in a market is high, a software vendor prefers a less secure product to a more secure product.

Lack of Incentives for Secure Software Results

Proposition 4  When the effective security risk is high and the patching cost is affordable to some users, the vendor’s optimal profit can decrease in the level of piracy enforcement. High Security Risk Low Piracy Enforcement Low High Results Increasing

Results

Proposition 4  When the effective security risk is high and the patching cost is affordable to some users, the vendor’s optimal profit can decrease in the level of piracy enforcement. High Security Risk Low Piracy Enforcement Low High Results Increasing Decreasing

Results

Proposition 5  When the patching cost and the effective security risk is low, social welfare can increase under a restrictive policy. Security patch restrictions can be welfare superior to a permissive approach

Let the Pirates Patch? Results

Concluding Remarks Summary  Model of network software security with piracy  Role of incentives in setting security patch restriction policies  Explain patch restrictions under high security risk  Microsoft’s permissive policy  Security risk can be strategically used by vendors as a tool to convert pirates into legitimate users  Security patch restrictions do not necessarily reduce welfare